US20210306818A1 - Charging policy obtaining method and apparatus - Google Patents
Charging policy obtaining method and apparatus Download PDFInfo
- Publication number
- US20210306818A1 US20210306818A1 US17/345,976 US202117345976A US2021306818A1 US 20210306818 A1 US20210306818 A1 US 20210306818A1 US 202117345976 A US202117345976 A US 202117345976A US 2021306818 A1 US2021306818 A1 US 2021306818A1
- Authority
- US
- United States
- Prior art keywords
- charging policy
- attribute
- request
- user equipment
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000013475 authorization Methods 0.000 claims abstract description 66
- 230000004044 response Effects 0.000 claims abstract description 38
- 230000003287 optical effect Effects 0.000 description 10
- 238000004891 communication Methods 0.000 description 9
- 238000012545 processing Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 7
- 102100036621 Glucosylceramide transporter ABCA12 Human genes 0.000 description 6
- 101100433776 Homo sapiens ABCA12 gene Proteins 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 239000000284 extract Substances 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000011664 signaling Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 238000000802 evaporation-induced self-assembly Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/14—Charging, metering or billing arrangements for data wireline or wireless communications
- H04L12/1403—Architecture for metering, charging or billing
- H04L12/1407—Policy-and-charging control [PCC] architecture
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/66—Policy and charging system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/70—Administration or customization aspects; Counter-checking correct charges
- H04M15/755—Account identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8011—Rating or billing plans; Tariff determination aspects using class of subscriber
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8022—Determining tariff or charge band
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/80—Rating or billing plans; Tariff determination aspects
- H04M15/8066—According to the number of recipients
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/853—Calculate maximum communication time or volume
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
- H04M15/83—Notification aspects
- H04M15/85—Notification aspects characterised by the type of condition triggering a notification
- H04M15/854—Available credit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/24—Accounting or billing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/16—Gateway arrangements
Definitions
- This application relates to the field of network communications, and in particular, to a charging policy obtaining method and apparatus.
- a broadband network has become an increasingly indispensable technology in people's work and entertainment.
- UE user equipment
- BNG broadband network gateway
- the broadband network gateway in addition to sending the user name to a server, the broadband network gateway needs to send a user equipment identifier to the server, to request the server to deliver a corresponding charging policy.
- the broadband network gateway concatenates the user name and the user equipment identifier to obtain a concatenated string, and sends, to the server, a charging policy request that carries the concatenated string.
- the server may deliver an incorrect charging policy to the broadband network gateway because the server cannot accurately obtain a user-matched charging policy based on the concatenated string. Consequently, a loss is caused to the user or an operator.
- Embodiments of this application provide a charging policy obtaining method and apparatus, to obtain and deliver a user-matched charging policy.
- an embodiment of this application provides a charging policy obtaining method.
- the method may be used in a broadband network gateway.
- the method includes the following steps:
- the broadband network gateway receives an authentication, authorization, and accounting (AAA) request from user equipment, where the authentication, authorization, and accounting request includes a user name and a user equipment identifier, and the user equipment identifier may include at least one of a circuit identifier (circuit ID) of the user equipment and a media access control (MAC) address of the user equipment.
- the broadband network gateway sends a charging policy request to a first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier.
- the broadband network gateway receives a charging policy response sent by the first server, where the charging policy response includes a charging policy that matches the user name and the user equipment identifier, and the broadband network gateway obtains the charging policy from the charging policy response.
- the charging policy request is used to request the first server to deliver the charging policy corresponding to the user name and the user equipment identifier.
- the charging policy that matches the user name and the user equipment identifier means that the charging policy has a correspondence with the user name and the user equipment identifier.
- the user name and the user equipment identifier are carried in two fields in the charging policy request.
- the first server can extract the user name from the first field and the user equipment identifier from the second field in the charging policy request.
- the first server can distinguish the user name and the user equipment identifier, and can accurately obtain the corresponding charging policy based on the two parameters: the user name and the user equipment identifier.
- the charging policy request may be a credit control request (CCR).
- the first field may be a first attribute-value pair (AVP)
- the second field may be a second attribute-value pair.
- An attribute of the first attribute-value pair is subscription identity data Subscription-Id-Data
- an attribute of the second attribute-value pair is a subscription identity group Subscription-Id-Group.
- an attribute of the first attribute-value pair is a subscription identity group Subscription-Id-Group
- an attribute of the second attribute-value pair is subscription identity data Subscription-Id-Data.
- the authentication, authorization, and accounting request further includes a password corresponding to the user name
- the method further includes: The broadband network gateway sends an authentication and authorization request to a second server, where the authentication and authorization request includes the user name and the password; and the broadband network gateway receives an authentication and authorization response sent by the second server, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password.
- the authentication and authorization request is used to request the second server to perform authentication and authorization based on the user name and the password.
- the second server stores a mapping relationship between a user name and a password. After receiving the authentication and authorization request, the second server determines whether the user name and the password in the authentication and authorization request are stored in the second server. If the user name and the password are stored in the second server, authentication and authorization succeed. If the user name and the password are not stored in the second server, authentication and authorization fail.
- the second server may send the result of authentication and authorization to the broadband network gateway. If the result of authentication and authorization indicates a success, the broadband network gateway may send the charging policy request to the first server. If the result of authentication and authorization indicates a failure, the broadband network gateway does not send the charging policy request to the first server.
- an embodiment of this application further provides a charging policy obtaining apparatus.
- the apparatus includes: a first receiving unit, configured to receive an authentication, authorization, and accounting request from user equipment, where the authentication, authorization, and accounting request includes a user name and a user equipment identifier; a first sending unit, configured to send a charging policy request to a first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier; and a second receiving unit, configured to: receive a charging policy response sent by the first server, where the charging policy response includes a charging policy corresponding to the user name and the user equipment identifier, and obtain the charging policy from the charging policy response.
- the charging policy request is used to request the first server to deliver the charging policy corresponding to the user name and the user equipment identifier.
- the charging policy obtaining apparatus may be disposed in a broadband network gateway.
- the charging policy request is a credit control request
- the first field is a first attribute-value pair
- the second field is a second attribute-value pair.
- an attribute of the first attribute-value pair is subscription identity data
- an attribute of the second attribute-value pair is a subscription identity group
- an attribute of the first attribute-value pair is a subscription identity group
- an attribute of the second attribute-value pair is subscription identity data
- the user equipment identifier includes at least one of a circuit identifier (circuit ID) of the user equipment and a media access control (MAC) address of the user equipment.
- circuit ID circuit identifier
- MAC media access control
- the authentication, authorization, and accounting request further includes a password corresponding to the user name.
- the apparatus further includes: a second sending unit, configured to send an authentication and authorization request to a second server before the first sending unit sends the charging policy request to the first server, where the authentication and authorization request includes the user name and the password; and a third receiving unit, configured to receive an authentication and authorization response sent by the second server, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password.
- the authentication and authorization request is used to request the second server to perform authentication and authorization based on the user name and the password.
- FIG. 1 is a signaling interaction diagram of a charging policy obtaining method according to an embodiment of this application
- FIG. 2 is a structural block diagram of a charging policy obtaining apparatus according to an embodiment of this application.
- FIG. 3 is an architectural diagram of hardware of a broadband network gateway according to an embodiment of this application.
- a broadband network gateway concatenates the user name and the user equipment identifier to obtain a concatenated string, and sends, to a server, a charging policy request that carries the concatenated string, so that the server obtains a corresponding charging policy based on the string, and sends the charging policy to the broadband network gateway.
- a disadvantage of this manner is that a same string may be obtained by concatenating different user names and user equipment identifiers.
- the server may obtain two or more charging policies based on the string. However, only one of the two or more charging policies, that is, a charging policy actually corresponding to the user name and the user equipment identifier, is correct. In this case, the server may send an incorrect charging policy to the broadband network gateway. Consequently, a loss is caused to a user or an operator.
- a user name 1 is ABC123, and a corresponding user equipment identifier 1 is 45; and a user name 2 is ABC12, and a corresponding user equipment identifier 2 is 345.
- a string 1 of ABC12345 is obtained by concatenating the user name 1 and the user equipment identifier 1
- a string 2 of ABC12345 is obtained by concatenating the user name 2 and the user equipment identifier 2.
- the server stores two charging policies. One charging policy corresponds to the user name 1 and the user equipment identifier 1, and the other charging policy corresponds to the user name 2 and the user equipment identifier 2.
- the server cannot determine, based on the string of ABC12345, which charging policy is required by the broadband network gateway, and may deliver an incorrect charging policy to the broadband network gateway.
- embodiments of this application provide a charging policy obtaining method and apparatus, so that a broadband network gateway can obtain a correct charging policy.
- FIG. 1 is a signaling interaction diagram of a charging policy obtaining method according to an embodiment of this application
- the charging policy obtaining method provided in this embodiment of this application is related to a broadband network gateway and a first server.
- the broadband network gateway is configured to send a charging policy request to the first server, where the charging policy request includes a user name and a user equipment identifier.
- the first server is configured to obtain a corresponding charging policy based on the user name and the user equipment identifier that are included in the charging policy request, and send the charging policy to the broadband network gateway.
- the first server may be a unified policy and charging controller (UPCC), or another type of server. This is not specifically limited in this application.
- UPCC unified policy and charging controller
- the method may include the following steps.
- the broadband network gateway receives an AAA request from user equipment, where the AAA request includes the user name and the user equipment identifier.
- the user equipment may be a mobile phone, a personal computer (PC), or a terminal such as a tablet personal computer (Tablet PC), a notebook computer, an ultra-mobile personal computer, or a personal digital assistant.
- the user equipment may be a device that supports a point-to-point protocol over Ethernet (PPPoE) or an internet protocol over Ethernet (IPoE).
- PPPoE point-to-point protocol over Ethernet
- IPoE internet protocol over Ethernet
- the user name is set by a user.
- a password is also set by the user.
- the user equipment identifier may include a circuit ID, a MAC address of the user equipment, and/or the like.
- the circuit identifier is used to identify circuit information of the user equipment. Different user equipments may correspond to a same circuit identifier or different circuit identifiers, and different user equipments correspond to different MAC addresses.
- the broadband network gateway receives the AAA request from the user equipment.
- the AAA request may be carried in a dynamic host configuration protocol (DHCP) packet, a point-to-point protocol (PPP) packet, or a PPPoE active discovery initiation (PADI) packet.
- DHCP dynamic host configuration protocol
- PPP point-to-point protocol
- PADI PPPoE active discovery initiation
- That the broadband network gateway receives the AAA request from the user equipment may be that the user equipment sends the AAA request to a controlled cable modem (CCM) or an optical line terminal (OLT) and then the controlled cable modem or the optical line terminal sends the AAA request to the broadband network gateway.
- CCM controlled cable modem
- OLT optical line terminal
- the user equipment and the controlled cable modem may be collectively referred to as customer-premises equipment (CPE).
- the AAA request sent by the user equipment to the controlled cable modem or the optical line terminal includes the user name and the password.
- the controlled cable modem or the optical line terminal After receiving the AAA request, the controlled cable modem or the optical line terminal generates a circuit identifier corresponding to the user name, adds a field in the AAA request, and uses the circuit identifier as a value in the field. Then, the controlled cable modem or the optical line terminal sends an AAA request with the added field to the broadband network gateway.
- the field added by the controlled cable modem in the AAA request may be a relay agent information option (Option82 for short) field.
- the field added by the optical line terminal in the first AAA request may be a tag field.
- the AAA request received by the controlled cable modem may be carried in a DHCP packet.
- the AAA request received by the optical line terminal may be carried in a PADI packet.
- the AAA request sent by the user equipment to the controlled cable modem or the optical line terminal includes the user name, the password, and the MAC address of the user equipment.
- the controlled cable modem or the optical line terminal After receiving the AAA request, the controlled cable modem or the optical line terminal forwards the AAA request to the broadband network gateway.
- the broadband network gateway may parse the AAA request to obtain the user name, the password, and the user equipment identifier.
- the broadband network gateway sends the charging policy request to the first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier.
- the charging policy request is a request used to obtain, from the first server, the charging policy corresponding to the user name and the user equipment identifier.
- the user name and the user equipment identifier are carried in two fields.
- the first server can extract the user name from the first field and the user equipment identifier from the second field in the charging policy request, and can accurately obtain the corresponding charging policy based on the user name and the user equipment identifier.
- the charging policy request may be a credit control request.
- a field may be referred to as an attribute-value pair. Therefore, the first field may be a first attribute-value pair, and the second field may be a second attribute-value pair.
- the user name may be a value of the first attribute-value pair, and the user equipment identifier may be a value of the second attribute-value pair.
- an attribute of the first attribute-value pair may be subscription identity data Subscription-Id-Data
- an attribute of the second attribute-value pair may be a subscription identity group Subscription-Id-Group.
- an attribute of the first attribute-value pair is a subscription identity group Subscription-Id-Group
- an attribute of the second attribute-value pair is subscription identity data Subscription-Id-Data.
- the attribute Subscription-Id-Data complies with a diameter credit control application (DCCA) protocol extended based on the basic diameter protocol. This protocol defines a real-time charging protocol framework. For details, refer to section 8.46 in RFC 4006.
- the Subscription-Id-Group included in the credit control request is a newly added attribute in this application.
- a user name 1 is ABC123, and a corresponding user equipment identifier 1 is 45; and a user name 2 is ABC12, and a corresponding user equipment identifier 2 is 345.
- a value corresponding to an attribute Subscription-Id-Group may be 45, and a value corresponding to an attribute Subscription-Id-Data may be ABC123.
- a value corresponding to an attribute Subscription-Id-Group may be 345, and a value corresponding to an attribute Subscription-Id-Data may be ABC12.
- the method provided in this embodiment of this application is not limited to being used in the diameter protocol.
- the charging policy request may be another type of request used to obtain a charging policy. This is not specifically limited in this embodiment of this application.
- the first server receives the charging policy request from the broadband network gateway, extracts the user name from the first field in the charging policy request, extracts the user equipment identifier from the second field in the charging policy request, and obtains the corresponding charging policy based on the user name and the user equipment identifier.
- the first server may obtain the user equipment identifier of 45 from the attribute-value pair corresponding to the Subscription-Id-Group, and obtain the user name of ABC123 from the attribute-value pair corresponding to the Subscription-Id-Data, and may accurately find a corresponding charging policy based on the user name of ABC123 and the user equipment identifier of 45.
- the first server may obtain the user equipment identifier of 345 from the attribute-value pair corresponding to the Subscription-Id-Group, and obtain the user name of ABC12 from the attribute-value pair corresponding to the Subscription-Id-Data, and may accurately find a corresponding charging policy based on the user name of ABC12 and the user equipment identifier of 345.
- the first server sends a charging policy response to the broadband network gateway, where the charging policy response includes the charging policy corresponding to the user name and the user equipment identifier.
- the first server may send the charging policy response to the broadband network gateway, where the charging policy response includes the charging policy.
- the charging policy response may be a credit control answer (CCA).
- CCA credit control answer
- the charging policy response may be another type of answer used to send a charging policy to the broadband network gateway. This is not specifically limited in this embodiment of this application.
- the broadband network gateway receives the charging policy response sent by the first server, and obtains, from the charging policy response, the charging policy corresponding to the user name and the user equipment identifier.
- the broadband network gateway may send an authentication and authorization request to a second server, where the authentication and authorization request includes the user name and the password in the AAA request, so that the second server can perform authentication and authorization based on the user name and the password.
- the second server stores a mapping relationship between a user name and a password. After receiving the authentication and authorization request, the second server determines whether the user name and the password in the authentication and authorization request are stored in the second server. If the user name and the password are stored in the second server, authentication and authorization succeed. If the user name and the password are not stored in the second server, authentication and authorization fail.
- the second server may send an authentication and authorization response to the broadband network gateway, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password. If the result of authentication and authorization indicates a success, the broadband network gateway may send the charging policy request to the first server. If the result of authentication and authorization indicates a failure, the broadband network gateway does not send the charging policy request to the first server.
- the second server may be a server that supports remote authentication dial in user service (RADIUS).
- the first server and the second server may be a same server, or may be different servers.
- an embodiment of this application further provides a charging policy obtaining apparatus used in a broadband network gateway.
- the broadband network gateway may implement a function of the broadband network gateway in the embodiment shown in FIG. 1 .
- the broadband network gateway includes a first receiving unit 201 , a first sending unit 202 , and a second receiving unit 203 .
- the first receiving unit 201 is configured to perform S 101 in the embodiment shown in FIG. 1 ;
- the first sending unit 202 is configured to perform S 102 in the embodiment shown in FIG. 1 ;
- the second receiving unit 203 is configured to perform S 105 in the embodiment shown in FIG. 1 .
- the first receiving unit 201 is configured to receive an authentication, authorization, and accounting request from user equipment, where the authentication, authorization, and accounting request includes a user name and a user equipment identifier.
- the first sending unit 202 is configured to send a charging policy request to a first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier.
- the second receiving unit 203 is configured to: receive a charging policy response sent by the first server, where the charging policy response includes a charging policy corresponding to the user name and the user equipment identifier, and obtain the charging policy from the charging policy response.
- the user name and the user equipment identifier are carried in two fields in the charging policy request.
- the first server can extract the user name from the first field and the user equipment identifier from the second field in the charging policy request.
- the first server can distinguish the user name and the user equipment identifier, and can accurately obtain the corresponding charging policy based on the user name and the user equipment identifier.
- the charging policy request is a credit control request
- the first field is a first attribute-value pair
- the second field is a second attribute-value pair.
- the first attribute-value pair is subscription identity data Subscription-Id-Data
- the second attribute-value pair is a subscription identity group Subscription-Id-Group
- the first attribute-value pair is a subscription identity group Subscription-Id-Group
- the second attribute-value pair is subscription identity data Subscription-Id-Data.
- the user equipment identifier may include at least one of a circuit identifier circuit ID of the user equipment and a MAC address of the user equipment.
- the authentication, authorization, and accounting request further includes a password corresponding to the user name.
- the apparatus further includes: a second sending unit, configured to send an authentication and authorization request to a second server before the first sending unit sends the charging policy request to the first server, where the authentication and authorization request includes the user name and the password; and
- a third receiving unit configured to receive an authentication and authorization response sent by the second server, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password.
- an embodiment of this application further provides a broadband network gateway 300 .
- the broadband network gateway 300 may implement a function of the broadband network gateway in the embodiment shown in FIG. 1 .
- the broadband network gateway 300 includes a storage unit 301 , a processing unit 302 , and a communications unit 303 .
- the storage unit 301 is configured to store an instruction.
- the processing unit 302 is configured to execute the instruction in storage unit 301 , to perform the charging policy obtaining method used in the broadband network gateway in the embodiment shown in FIG. 1 .
- the communications unit 303 is configured to communicate with a first server.
- the storage unit 301 , the processing unit 302 , and the communications unit 303 are connected to each other through a bus 304 .
- the bus 304 may be a peripheral component interconnect (PCI for short) bus, an extended industry standard architecture (EISA for short) bus, or the like.
- PCI peripheral component interconnect
- EISA extended industry standard architecture
- the bus may be classified into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used to represent the bus in FIG. 3 , but this does not mean that there is only one bus or only one type of bus.
- the storage unit 301 may be a random access memory (RAM), a flash memory, a read-only memory (ROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a register, a hard disk, a removable hard disk, a CD-ROM, or a storage medium of any other form known to persons skilled in the art.
- RAM random access memory
- ROM read-only memory
- EPROM erasable programmable read-only memory
- EEPROM electrically erasable programmable read-only memory
- the processing unit 302 may be a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or another programmable logic device, a transistor logic device, a hardware component, or any combination thereof.
- the processing unit 302 may implement or execute various example logical blocks, modules, and circuits described with reference to content disclosed in this application.
- the processing unit 302 may be a combination of processors implementing a computing function, for example, a combination of one or more microprocessors, or a combination of a DSP and a microprocessor.
- the communications unit 303 may be, for example, an interface card, or may be an Ethernet interface or an asynchronous transfer mode (ATM) interface.
- ATM asynchronous transfer mode
- An embodiment of this application further provides a computer-readable storage medium including an instruction.
- the instruction When the instruction is run on a computer, the computer is enabled to perform the charging policy obtaining method used in the broadband network gateway.
- An embodiment of this application further provides a charging policy obtaining system.
- the system includes the broadband network gateway and the first server that are provided in the embodiment shown in FIG. 1 .
- the disclosed system, apparatus, and method may be implemented in other manners.
- the described apparatus embodiment is merely an example.
- division into the units is merely logical function division and may be other division in an actual implementation.
- a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed.
- the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces.
- the indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
- the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units may be selected based on an actual requirement to achieve the objectives of the solutions of the embodiments.
- functional units in the embodiments of this application may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
- the integrated unit may be implemented in a form of hardware, or may be implemented in a form of a software functional unit.
- the integrated unit When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, the integrated unit may be stored in a computer-readable storage medium.
- the computer software product is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or some of the steps of the method described in the embodiments of this application.
- the foregoing storage medium includes any medium that can store program code, for example, a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
- the computer-readable medium includes a computer storage medium and a communications medium.
- the communications medium includes any medium that enables a computer program to be transmitted from one place to another.
- the storage medium may be any available medium accessible to a general-purpose computer or a dedicated computer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
- This application is a continuation of International Application No. PCT/CN2019/124897, filed on Dec. 12, 2019, which claims priority to Chinese Patent Application No. CN201811536073.7, filed on Dec. 14, 2018. The disclosures of the aforementioned applications are hereby incorporated by reference in their entireties.
- This application relates to the field of network communications, and in particular, to a charging policy obtaining method and apparatus.
- As technologies develop, a broadband network has become an increasingly indispensable technology in people's work and entertainment. When user equipment (UE) needs to access a broadband network, the user equipment needs to send a user name and a password to a broadband network gateway (BNG), so that the broadband network gateway performs authentication, authorization, and accounting based on the user name and the password.
- Currently, in some charging scenarios, in addition to sending the user name to a server, the broadband network gateway needs to send a user equipment identifier to the server, to request the server to deliver a corresponding charging policy. In a conventional manner, the broadband network gateway concatenates the user name and the user equipment identifier to obtain a concatenated string, and sends, to the server, a charging policy request that carries the concatenated string. However, in this manner, the server may deliver an incorrect charging policy to the broadband network gateway because the server cannot accurately obtain a user-matched charging policy based on the concatenated string. Consequently, a loss is caused to the user or an operator.
- Embodiments of this application provide a charging policy obtaining method and apparatus, to obtain and deliver a user-matched charging policy.
- According to a first aspect, an embodiment of this application provides a charging policy obtaining method. The method may be used in a broadband network gateway. The method includes the following steps: The broadband network gateway receives an authentication, authorization, and accounting (AAA) request from user equipment, where the authentication, authorization, and accounting request includes a user name and a user equipment identifier, and the user equipment identifier may include at least one of a circuit identifier (circuit ID) of the user equipment and a media access control (MAC) address of the user equipment. The broadband network gateway sends a charging policy request to a first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier. The broadband network gateway receives a charging policy response sent by the first server, where the charging policy response includes a charging policy that matches the user name and the user equipment identifier, and the broadband network gateway obtains the charging policy from the charging policy response.
- In the foregoing method, the charging policy request is used to request the first server to deliver the charging policy corresponding to the user name and the user equipment identifier. The charging policy that matches the user name and the user equipment identifier means that the charging policy has a correspondence with the user name and the user equipment identifier.
- In comparison with a conventional technology in which a user name and a user equipment identifier are concatenated and carried in one field, in this embodiment of this application, the user name and the user equipment identifier are carried in two fields in the charging policy request. In this way, the first server can extract the user name from the first field and the user equipment identifier from the second field in the charging policy request. In other words, the first server can distinguish the user name and the user equipment identifier, and can accurately obtain the corresponding charging policy based on the two parameters: the user name and the user equipment identifier.
- Optionally, the charging policy request may be a credit control request (CCR). In this case, the first field may be a first attribute-value pair (AVP), and the second field may be a second attribute-value pair. An attribute of the first attribute-value pair is subscription identity data Subscription-Id-Data, and an attribute of the second attribute-value pair is a subscription identity group Subscription-Id-Group. Alternatively, an attribute of the first attribute-value pair is a subscription identity group Subscription-Id-Group, and an attribute of the second attribute-value pair is subscription identity data Subscription-Id-Data.
- Optionally, to improve reliability of a broadband network service, the authentication, authorization, and accounting request further includes a password corresponding to the user name, and before the sending a charging policy request to a first server, the method further includes: The broadband network gateway sends an authentication and authorization request to a second server, where the authentication and authorization request includes the user name and the password; and the broadband network gateway receives an authentication and authorization response sent by the second server, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password.
- The authentication and authorization request is used to request the second server to perform authentication and authorization based on the user name and the password. The second server stores a mapping relationship between a user name and a password. After receiving the authentication and authorization request, the second server determines whether the user name and the password in the authentication and authorization request are stored in the second server. If the user name and the password are stored in the second server, authentication and authorization succeed. If the user name and the password are not stored in the second server, authentication and authorization fail. The second server may send the result of authentication and authorization to the broadband network gateway. If the result of authentication and authorization indicates a success, the broadband network gateway may send the charging policy request to the first server. If the result of authentication and authorization indicates a failure, the broadband network gateway does not send the charging policy request to the first server.
- According to a second aspect, an embodiment of this application further provides a charging policy obtaining apparatus. The apparatus includes: a first receiving unit, configured to receive an authentication, authorization, and accounting request from user equipment, where the authentication, authorization, and accounting request includes a user name and a user equipment identifier; a first sending unit, configured to send a charging policy request to a first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier; and a second receiving unit, configured to: receive a charging policy response sent by the first server, where the charging policy response includes a charging policy corresponding to the user name and the user equipment identifier, and obtain the charging policy from the charging policy response.
- The charging policy request is used to request the first server to deliver the charging policy corresponding to the user name and the user equipment identifier. The charging policy obtaining apparatus may be disposed in a broadband network gateway.
- Optionally, the charging policy request is a credit control request, the first field is a first attribute-value pair, and the second field is a second attribute-value pair.
- Optionally, an attribute of the first attribute-value pair is subscription identity data, and an attribute of the second attribute-value pair is a subscription identity group.
- Optionally, an attribute of the first attribute-value pair is a subscription identity group, and an attribute of the second attribute-value pair is subscription identity data.
- Optionally, the user equipment identifier includes at least one of a circuit identifier (circuit ID) of the user equipment and a media access control (MAC) address of the user equipment.
- Optionally, the authentication, authorization, and accounting request further includes a password corresponding to the user name. The apparatus further includes: a second sending unit, configured to send an authentication and authorization request to a second server before the first sending unit sends the charging policy request to the first server, where the authentication and authorization request includes the user name and the password; and a third receiving unit, configured to receive an authentication and authorization response sent by the second server, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password. The authentication and authorization request is used to request the second server to perform authentication and authorization based on the user name and the password.
-
FIG. 1 is a signaling interaction diagram of a charging policy obtaining method according to an embodiment of this application; -
FIG. 2 is a structural block diagram of a charging policy obtaining apparatus according to an embodiment of this application; and -
FIG. 3 is an architectural diagram of hardware of a broadband network gateway according to an embodiment of this application. - In a conventional manner, after obtaining a user name and a user equipment identifier, a broadband network gateway concatenates the user name and the user equipment identifier to obtain a concatenated string, and sends, to a server, a charging policy request that carries the concatenated string, so that the server obtains a corresponding charging policy based on the string, and sends the charging policy to the broadband network gateway.
- A disadvantage of this manner is that a same string may be obtained by concatenating different user names and user equipment identifiers. In this case, the server may obtain two or more charging policies based on the string. However, only one of the two or more charging policies, that is, a charging policy actually corresponding to the user name and the user equipment identifier, is correct. In this case, the server may send an incorrect charging policy to the broadband network gateway. Consequently, a loss is caused to a user or an operator.
- For example, it is assumed that a user name 1 is ABC123, and a corresponding user equipment identifier 1 is 45; and a user name 2 is ABC12, and a corresponding user equipment identifier 2 is 345. A string 1 of ABC12345 is obtained by concatenating the user name 1 and the user equipment identifier 1, and a string 2 of ABC12345 is obtained by concatenating the user name 2 and the user equipment identifier 2. The server stores two charging policies. One charging policy corresponds to the user name 1 and the user equipment identifier 1, and the other charging policy corresponds to the user name 2 and the user equipment identifier 2. However, the server cannot determine, based on the string of ABC12345, which charging policy is required by the broadband network gateway, and may deliver an incorrect charging policy to the broadband network gateway.
- To resolve the foregoing technical problem, embodiments of this application provide a charging policy obtaining method and apparatus, so that a broadband network gateway can obtain a correct charging policy.
-
FIG. 1 is a signaling interaction diagram of a charging policy obtaining method according to an embodiment of this application; - The charging policy obtaining method provided in this embodiment of this application is related to a broadband network gateway and a first server. The broadband network gateway is configured to send a charging policy request to the first server, where the charging policy request includes a user name and a user equipment identifier. The first server is configured to obtain a corresponding charging policy based on the user name and the user equipment identifier that are included in the charging policy request, and send the charging policy to the broadband network gateway. The first server may be a unified policy and charging controller (UPCC), or another type of server. This is not specifically limited in this application.
- Specifically, the method may include the following steps.
- S101: The broadband network gateway receives an AAA request from user equipment, where the AAA request includes the user name and the user equipment identifier.
- In this embodiment of this application, the user equipment may be a mobile phone, a personal computer (PC), or a terminal such as a tablet personal computer (Tablet PC), a notebook computer, an ultra-mobile personal computer, or a personal digital assistant. In this embodiment of this application, the user equipment may be a device that supports a point-to-point protocol over Ethernet (PPPoE) or an internet protocol over Ethernet (IPoE).
- Generally, the user name is set by a user. In addition to the user name, a password is also set by the user.
- The user equipment identifier may include a circuit ID, a MAC address of the user equipment, and/or the like. The circuit identifier is used to identify circuit information of the user equipment. Different user equipments may correspond to a same circuit identifier or different circuit identifiers, and different user equipments correspond to different MAC addresses.
- In this embodiment of this application, the broadband network gateway receives the AAA request from the user equipment. The AAA request may be carried in a dynamic host configuration protocol (DHCP) packet, a point-to-point protocol (PPP) packet, or a PPPoE active discovery initiation (PADI) packet.
- That the broadband network gateway receives the AAA request from the user equipment may be that the user equipment sends the AAA request to a controlled cable modem (CCM) or an optical line terminal (OLT) and then the controlled cable modem or the optical line terminal sends the AAA request to the broadband network gateway. In some application scenarios, the user equipment and the controlled cable modem may be collectively referred to as customer-premises equipment (CPE).
- When the user equipment identifier includes the circuit identifier, the AAA request sent by the user equipment to the controlled cable modem or the optical line terminal includes the user name and the password. After receiving the AAA request, the controlled cable modem or the optical line terminal generates a circuit identifier corresponding to the user name, adds a field in the AAA request, and uses the circuit identifier as a value in the field. Then, the controlled cable modem or the optical line terminal sends an AAA request with the added field to the broadband network gateway. The field added by the controlled cable modem in the AAA request may be a relay agent information option (Option82 for short) field. The field added by the optical line terminal in the first AAA request may be a tag field. The AAA request received by the controlled cable modem may be carried in a DHCP packet. The AAA request received by the optical line terminal may be carried in a PADI packet.
- When the user equipment identifier includes the MAC address, the AAA request sent by the user equipment to the controlled cable modem or the optical line terminal includes the user name, the password, and the MAC address of the user equipment. After receiving the AAA request, the controlled cable modem or the optical line terminal forwards the AAA request to the broadband network gateway.
- After receiving the AAA request, the broadband network gateway may parse the AAA request to obtain the user name, the password, and the user equipment identifier.
- S102: The broadband network gateway sends the charging policy request to the first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier.
- In this embodiment of this application, the charging policy request is a request used to obtain, from the first server, the charging policy corresponding to the user name and the user equipment identifier. In comparison with a conventional technology in which a user name and a user equipment identifier are concatenated and carried in one field, in the charging policy request, the user name and the user equipment identifier are carried in two fields. In this way, the first server can extract the user name from the first field and the user equipment identifier from the second field in the charging policy request, and can accurately obtain the corresponding charging policy based on the user name and the user equipment identifier.
- In a diameter protocol, the charging policy request may be a credit control request. In the credit control request, a field may be referred to as an attribute-value pair. Therefore, the first field may be a first attribute-value pair, and the second field may be a second attribute-value pair. In other words, the user name may be a value of the first attribute-value pair, and the user equipment identifier may be a value of the second attribute-value pair.
- For example, an attribute of the first attribute-value pair may be subscription identity data Subscription-Id-Data, and an attribute of the second attribute-value pair may be a subscription identity group Subscription-Id-Group. Alternatively, an attribute of the first attribute-value pair is a subscription identity group Subscription-Id-Group, and an attribute of the second attribute-value pair is subscription identity data Subscription-Id-Data. The attribute Subscription-Id-Data complies with a diameter credit control application (DCCA) protocol extended based on the basic diameter protocol. This protocol defines a real-time charging protocol framework. For details, refer to section 8.46 in RFC 4006. The Subscription-Id-Group included in the credit control request is a newly added attribute in this application. Certainly, it may be understood that using the Subscription-Id-Data and the Subscription-Id-Group as the attributes of the attribute-value pairs does not constitute a limitation on this application. Persons skilled in the art may make a selection based on an actual situation.
- The foregoing example is still used as an example. It is assumed that a user name 1 is ABC123, and a corresponding user equipment identifier 1 is 45; and a user name 2 is ABC12, and a corresponding user equipment identifier 2 is 345. In a credit control request 1 sent by the broadband network gateway to the first server, a value corresponding to an attribute Subscription-Id-Group may be 45, and a value corresponding to an attribute Subscription-Id-Data may be ABC123. In a credit control request 2 sent by the broadband network gateway to the first server, a value corresponding to an attribute Subscription-Id-Group may be 345, and a value corresponding to an attribute Subscription-Id-Data may be ABC12.
- Certainly, it may be understood that the method provided in this embodiment of this application is not limited to being used in the diameter protocol. In addition to the credit control request, the charging policy request may be another type of request used to obtain a charging policy. This is not specifically limited in this embodiment of this application.
- S103: The first server receives the charging policy request from the broadband network gateway, extracts the user name from the first field in the charging policy request, extracts the user equipment identifier from the second field in the charging policy request, and obtains the corresponding charging policy based on the user name and the user equipment identifier.
- The foregoing example is still used as an example. After receiving the credit control request 1, the first server may obtain the user equipment identifier of 45 from the attribute-value pair corresponding to the Subscription-Id-Group, and obtain the user name of ABC123 from the attribute-value pair corresponding to the Subscription-Id-Data, and may accurately find a corresponding charging policy based on the user name of ABC123 and the user equipment identifier of 45. Likewise, after receiving the credit control request 2, the first server may obtain the user equipment identifier of 345 from the attribute-value pair corresponding to the Subscription-Id-Group, and obtain the user name of ABC12 from the attribute-value pair corresponding to the Subscription-Id-Data, and may accurately find a corresponding charging policy based on the user name of ABC12 and the user equipment identifier of 345.
- It can be learned that, in comparison with a conventional technical solution in which an incorrect charging policy may be delivered because whether ABC12345 that is obtained by concatenating the user name and the user equipment identifier actually represents the user name of ABC123 and the user equipment identifier of 45, or the user name of ABC12 and the user equipment identifier 345 cannot be distinguished, in this embodiment of this application, the charging policy that matches the user can be obtained and delivered.
- S104: The first server sends a charging policy response to the broadband network gateway, where the charging policy response includes the charging policy corresponding to the user name and the user equipment identifier.
- After obtaining the charging policy corresponding to the user name and the user equipment identifier, the first server may send the charging policy response to the broadband network gateway, where the charging policy response includes the charging policy.
- In the diameter protocol, the charging policy response may be a credit control answer (CCA). Certainly, it may be understood that the method provided in this embodiment of this application is not limited to being used in the diameter protocol. In addition to the credit control answer, the charging policy response may be another type of answer used to send a charging policy to the broadband network gateway. This is not specifically limited in this embodiment of this application.
- S105: The broadband network gateway receives the charging policy response sent by the first server, and obtains, from the charging policy response, the charging policy corresponding to the user name and the user equipment identifier.
- In addition, in an actual application, to improve reliability of a broadband network service, before sending the charging policy request to the first server, the broadband network gateway may send an authentication and authorization request to a second server, where the authentication and authorization request includes the user name and the password in the AAA request, so that the second server can perform authentication and authorization based on the user name and the password. Specifically, the second server stores a mapping relationship between a user name and a password. After receiving the authentication and authorization request, the second server determines whether the user name and the password in the authentication and authorization request are stored in the second server. If the user name and the password are stored in the second server, authentication and authorization succeed. If the user name and the password are not stored in the second server, authentication and authorization fail.
- The second server may send an authentication and authorization response to the broadband network gateway, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password. If the result of authentication and authorization indicates a success, the broadband network gateway may send the charging policy request to the first server. If the result of authentication and authorization indicates a failure, the broadband network gateway does not send the charging policy request to the first server.
- Optionally, the second server may be a server that supports remote authentication dial in user service (RADIUS). In an actual application, the first server and the second server may be a same server, or may be different servers.
- Correspondingly, an embodiment of this application further provides a charging policy obtaining apparatus used in a broadband network gateway. The broadband network gateway may implement a function of the broadband network gateway in the embodiment shown in
FIG. 1 . The broadband network gateway includes afirst receiving unit 201, afirst sending unit 202, and asecond receiving unit 203. Thefirst receiving unit 201 is configured to perform S101 in the embodiment shown inFIG. 1 ; the first sendingunit 202 is configured to perform S102 in the embodiment shown inFIG. 1 ; and thesecond receiving unit 203 is configured to perform S105 in the embodiment shown inFIG. 1 . - Specifically, the
first receiving unit 201 is configured to receive an authentication, authorization, and accounting request from user equipment, where the authentication, authorization, and accounting request includes a user name and a user equipment identifier. - The
first sending unit 202 is configured to send a charging policy request to a first server, where the charging policy request includes a first field and a second field, the first field is used to carry the user name, and the second field is used to carry the user equipment identifier. - The
second receiving unit 203 is configured to: receive a charging policy response sent by the first server, where the charging policy response includes a charging policy corresponding to the user name and the user equipment identifier, and obtain the charging policy from the charging policy response. - In comparison with a conventional technology in which a user name and a user equipment identifier are concatenated and carried in one field, in this embodiment of this application, the user name and the user equipment identifier are carried in two fields in the charging policy request. In this way, the first server can extract the user name from the first field and the user equipment identifier from the second field in the charging policy request. In other words, the first server can distinguish the user name and the user equipment identifier, and can accurately obtain the corresponding charging policy based on the user name and the user equipment identifier.
- Optionally, the charging policy request is a credit control request, the first field is a first attribute-value pair, and the second field is a second attribute-value pair.
- Optionally, the first attribute-value pair is subscription identity data Subscription-Id-Data, and the second attribute-value pair is a subscription identity group Subscription-Id-Group. Alternatively, the first attribute-value pair is a subscription identity group Subscription-Id-Group, and the second attribute-value pair is subscription identity data Subscription-Id-Data.
- Optionally, the user equipment identifier may include at least one of a circuit identifier circuit ID of the user equipment and a MAC address of the user equipment.
- Optionally, the authentication, authorization, and accounting request further includes a password corresponding to the user name. The apparatus further includes: a second sending unit, configured to send an authentication and authorization request to a second server before the first sending unit sends the charging policy request to the first server, where the authentication and authorization request includes the user name and the password; and
- a third receiving unit, configured to receive an authentication and authorization response sent by the second server, where the authentication and authorization response includes a result of authentication and authorization that are performed based on the user name and the password.
- As shown in
FIG. 3 , an embodiment of this application further provides abroadband network gateway 300. Thebroadband network gateway 300 may implement a function of the broadband network gateway in the embodiment shown inFIG. 1 . Thebroadband network gateway 300 includes astorage unit 301, aprocessing unit 302, and acommunications unit 303. - The
storage unit 301 is configured to store an instruction. - The
processing unit 302 is configured to execute the instruction instorage unit 301, to perform the charging policy obtaining method used in the broadband network gateway in the embodiment shown inFIG. 1 . - The
communications unit 303 is configured to communicate with a first server. - The
storage unit 301, theprocessing unit 302, and thecommunications unit 303 are connected to each other through abus 304. Thebus 304 may be a peripheral component interconnect (PCI for short) bus, an extended industry standard architecture (EISA for short) bus, or the like. The bus may be classified into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used to represent the bus inFIG. 3 , but this does not mean that there is only one bus or only one type of bus. - The
storage unit 301 may be a random access memory (RAM), a flash memory, a read-only memory (ROM), an erasable programmable read-only memory (EPROM), an electrically erasable programmable read-only memory (EEPROM), a register, a hard disk, a removable hard disk, a CD-ROM, or a storage medium of any other form known to persons skilled in the art. - For example, the
processing unit 302 may be a central processing unit (CPU), a general-purpose processor, a digital signal processor (DSP), an application-specific integrated circuit (ASIC), a field programmable gate array (FPGA) or another programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Theprocessing unit 302 may implement or execute various example logical blocks, modules, and circuits described with reference to content disclosed in this application. Alternatively, theprocessing unit 302 may be a combination of processors implementing a computing function, for example, a combination of one or more microprocessors, or a combination of a DSP and a microprocessor. - The
communications unit 303 may be, for example, an interface card, or may be an Ethernet interface or an asynchronous transfer mode (ATM) interface. - An embodiment of this application further provides a computer-readable storage medium including an instruction. When the instruction is run on a computer, the computer is enabled to perform the charging policy obtaining method used in the broadband network gateway.
- An embodiment of this application further provides a charging policy obtaining system. The system includes the broadband network gateway and the first server that are provided in the embodiment shown in
FIG. 1 . - In the specification, claims, and accompanying drawings of this application, the terms “first”, “second”, “third”, “fourth”, and the like (if used) are intended to distinguish between similar objects but do not necessarily indicate a specific order or sequence. It should be understood that data termed in such a way are interchangeable in proper circumstances so that the embodiments described herein can be implemented in other orders than the order illustrated or described herein. Moreover, the terms “include”, “have”, and any other variants mean to cover the non-exclusive inclusion, for example, a process, method, system, product, or device that includes a list of steps or units is not necessarily limited to those steps or units, but may include other steps or units not expressly listed or inherent to such a process, method, product, or device.
- It may be clearly understood by persons skilled in the art that, for convenient and brief description, for a detailed working process of the foregoing system, apparatus, and unit, reference may be made to a corresponding process in the foregoing method embodiment, and details are not described herein again.
- In the several embodiments provided in this application, it should be understood that the disclosed system, apparatus, and method may be implemented in other manners. For example, the described apparatus embodiment is merely an example. For example, division into the units is merely logical function division and may be other division in an actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
- The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. Some or all of the units may be selected based on an actual requirement to achieve the objectives of the solutions of the embodiments.
- In addition, functional units in the embodiments of this application may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in a form of hardware, or may be implemented in a form of a software functional unit.
- When the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, the integrated unit may be stored in a computer-readable storage medium. Based on such an understanding, the technical solutions of this application essentially, or the part contributing to the conventional technology, or all or some of the technical solutions may be implemented in the form of a software product. The computer software product is stored in a storage medium and includes several instructions for instructing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or some of the steps of the method described in the embodiments of this application. The foregoing storage medium includes any medium that can store program code, for example, a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disc.
- Persons skilled in the art should be aware that in the foregoing one or more examples, functions described in the present invention may be implemented by hardware, software, firmware, or any combination thereof. When the functions are implemented by software, these functions may be stored in a computer-readable medium or transmitted as one or more instructions or code in the computer-readable medium. The computer-readable medium includes a computer storage medium and a communications medium. The communications medium includes any medium that enables a computer program to be transmitted from one place to another. The storage medium may be any available medium accessible to a general-purpose computer or a dedicated computer.
- In the foregoing specific implementations, the objectives, technical solutions, and benefits of the present invention are further described in detail. It should be understood that the foregoing descriptions are merely specific implementations of the present invention.
- In conclusion, the foregoing embodiments are merely intended for describing the technical solutions of this application, but not for limiting this application. Although this application is described in detail with reference to the foregoing embodiments, persons of ordinary skill in the art should understand that they may still make modifications to the technical solutions described in the foregoing embodiments or make equivalent replacements to some technical features thereof, without departing from the scope of the technical solutions of the embodiments of this application.
Claims (12)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811536073.7 | 2018-12-14 | ||
| CN201811536073.7A CN111327431B (en) | 2018-12-14 | 2018-12-14 | Charging policy obtaining method and device |
| PCT/CN2019/124897 WO2020119768A1 (en) | 2018-12-14 | 2019-12-12 | Accounting policy acquisition method and apparatus |
Related Parent Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2019/124897 Continuation WO2020119768A1 (en) | 2018-12-14 | 2019-12-12 | Accounting policy acquisition method and apparatus |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20210306818A1 true US20210306818A1 (en) | 2021-09-30 |
| US11758372B2 US11758372B2 (en) | 2023-09-12 |
Family
ID=71076793
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US17/345,976 Active 2040-08-24 US11758372B2 (en) | 2018-12-14 | 2021-06-11 | Charging policy obtaining method and apparatus |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US11758372B2 (en) |
| EP (1) | EP3883179B1 (en) |
| CN (1) | CN111327431B (en) |
| BR (1) | BR112021010671A2 (en) |
| WO (1) | WO2020119768A1 (en) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114266059A (en) * | 2021-12-24 | 2022-04-01 | 北京天融信网络安全技术有限公司 | A policy file distribution method, apparatus, electronic device and storage medium |
| CN116366384B (en) * | 2023-03-23 | 2025-11-07 | 浪潮思科网络科技有限公司 | Charging method, device and medium based on MAC address |
| CN119172126B (en) * | 2024-09-02 | 2025-10-03 | 新华三技术有限公司 | Communication method and device |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120030143A1 (en) * | 2010-07-27 | 2012-02-02 | Cellco Partnership | Charging for data offloading |
| US20140189838A1 (en) * | 2011-08-03 | 2014-07-03 | Zte Corporation | Access method,and system and mobile intelligent access point |
| US20170180374A1 (en) * | 2015-12-18 | 2017-06-22 | Juniper Networks, Inc. | Result reporting for authentication, authorization and accounting protocols |
Family Cites Families (16)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN100561927C (en) * | 2006-01-12 | 2009-11-18 | 中兴通讯股份有限公司 | A remote dial-up access service authentication protocol authentication and accounting method |
| CN101090325A (en) * | 2006-06-23 | 2007-12-19 | 华为技术有限公司 | Third-party billing method and system |
| CN101106464B (en) * | 2006-07-14 | 2011-04-20 | 中兴通讯股份有限公司 | A method for prepaying code division multi-address packet data service |
| CN101022347A (en) * | 2006-07-17 | 2007-08-22 | 鲍东山 | Compatible CAS and DRM MMB charging system |
| CN101163000B (en) * | 2006-10-13 | 2011-03-02 | 中兴通讯股份有限公司 | Secondary authentication method and system |
| WO2011020498A1 (en) * | 2009-08-18 | 2011-02-24 | Telefonaktiebolaget Lm Ericsson (Publ) | Method, apparatus and computer program for enforcing policy across associated sessions taking into account a total usage quota for associated user |
| CN101998348A (en) * | 2009-08-25 | 2011-03-30 | 中兴通讯股份有限公司 | Charging system and charging method thereof |
| CN102045176B (en) * | 2009-10-12 | 2014-08-20 | 杭州华三通信技术有限公司 | Method and system for multicast charging |
| CN102244580B (en) * | 2010-05-11 | 2014-12-31 | 华为技术有限公司 | Online charging method, communication device and communication system |
| CN103533599A (en) * | 2012-07-03 | 2014-01-22 | 中兴通讯股份有限公司 | Strategy control method under fixed network fusion scene |
| CN103702311A (en) * | 2012-09-27 | 2014-04-02 | 中兴通讯股份有限公司 | Method and system for selecting VPLMN (visited public land mobile network) and packet data network gateway |
| EP2912832A1 (en) * | 2012-10-29 | 2015-09-02 | Nokia Solutions and Networks Oy | User location when accessing a 3gpp network through a fixed network |
| CN105101136B (en) * | 2014-04-08 | 2019-01-11 | 华为技术有限公司 | A kind of charging method of data service, apparatus and system |
| US9763168B1 (en) * | 2016-09-30 | 2017-09-12 | T-Mobile Usa, Inc. | Blocked device checking in roaming scenarios |
| CN106533708A (en) * | 2017-01-17 | 2017-03-22 | 深圳恒远智信科技有限公司 | Method for changing data business charging strategy, scene server and user equipment |
| CN112738744B (en) * | 2017-02-07 | 2025-01-07 | 华为技术有限公司 | A charging method, device and system |
-
2018
- 2018-12-14 CN CN201811536073.7A patent/CN111327431B/en active Active
-
2019
- 2019-12-12 BR BR112021010671-5A patent/BR112021010671A2/en unknown
- 2019-12-12 EP EP19895506.4A patent/EP3883179B1/en active Active
- 2019-12-12 WO PCT/CN2019/124897 patent/WO2020119768A1/en not_active Ceased
-
2021
- 2021-06-11 US US17/345,976 patent/US11758372B2/en active Active
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20120030143A1 (en) * | 2010-07-27 | 2012-02-02 | Cellco Partnership | Charging for data offloading |
| US20140189838A1 (en) * | 2011-08-03 | 2014-07-03 | Zte Corporation | Access method,and system and mobile intelligent access point |
| US20170180374A1 (en) * | 2015-12-18 | 2017-06-22 | Juniper Networks, Inc. | Result reporting for authentication, authorization and accounting protocols |
Also Published As
| Publication number | Publication date |
|---|---|
| US11758372B2 (en) | 2023-09-12 |
| BR112021010671A2 (en) | 2021-08-24 |
| CN111327431A (en) | 2020-06-23 |
| EP3883179A4 (en) | 2022-01-05 |
| EP3883179A1 (en) | 2021-09-22 |
| EP3883179B1 (en) | 2025-07-30 |
| CN111327431B (en) | 2022-11-22 |
| WO2020119768A1 (en) | 2020-06-18 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11606223B2 (en) | Broadband remote access server (BRAS) system-based packet encapsulation | |
| US11758372B2 (en) | Charging policy obtaining method and apparatus | |
| EP4391462B1 (en) | Method and apparatus for accessing gateway | |
| CN108738013B (en) | Network access method, device and network equipment | |
| US8400943B2 (en) | IPv6 addressing over non-IPv6 systems | |
| JP6526248B2 (en) | Server and program | |
| CN106487788B (en) | A kind of user access method, SDN controller, forwarding device and subscriber access system | |
| EP2346217A1 (en) | Method, device and system for identifying ip session | |
| US8887237B2 (en) | Multimode authentication | |
| CN108307694A (en) | A kind of network connection information acquisition methods and router | |
| WO2019047611A1 (en) | Data transmission method, pnf sdn controller, vnf sdn controller, and system | |
| CN105959188A (en) | Method and device for controlling user terminal to be online | |
| US10666650B2 (en) | Packet processing method in PPPoE authentication process and relevant device | |
| CN105052239B (en) | Policy control method, related device and system | |
| WO2017166038A1 (en) | Communication method and terminal | |
| CN109982311B (en) | Method for accessing terminal to core network equipment, terminal, MME and SAEGW | |
| WO2016078090A1 (en) | Charging control device, method and system | |
| CN107547324B (en) | MAC address issuing method, device, equipment and machine readable storage medium | |
| EP2911445A1 (en) | Method and network device for receiving packet | |
| US9992164B2 (en) | User based stateless IPv6 RA-guard | |
| CN113098825A (en) | Access authentication method and system based on extended 802.1X | |
| CN117478718A (en) | Link negotiation control method, device, equipment and computer storage medium | |
| CN118802840A (en) | Terminal device service identification allocation method, equipment, medium and product | |
| WO2022270228A1 (en) | Device and method for providing communication service for accessing ip network, and program therefor | |
| CN114945172A (en) | Network access method and system, communication network, electronic device and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| AS | Assignment |
Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:WU, ZHEWEN;REEL/FRAME:060931/0346 Effective date: 20220407 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |